In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.
In early April, Wall Street’s oversight committee announced that bank’s oversight of cybersecurity measures at outside firms it does business with remains a work in progress, at best. It cited a survey of 40 banks that found that only about a third require their outside vendors to notify them of any breach to their own networks, which could in turn compromise confidential information of the bank and its customers.
There are times and situations when security executives or law enforcement need to mount a covert investigation or monitoring event that may include cameras, sometimes infrared and low light, or audio.
With enterprises’ rising reliance on data and the need to protect it, investments in data security and data centers are rising. Data center company Equinix Inc. is expanding its Rio de Janeiro data center; Penn State University is finalizing plans for a second data center, projected at a cost of $58 million; Google is reportedly considering a $300 million data center expansion at its campus outside of Atlanta.
For Chanda Litten, light rail in Sacramento is the way to get around although she was sometimes faced with characters who made her uneasy. “It’s really dark, and you see some undesirables,” she reported to a local TV station. “It doesn’t happen often, but when it does it can be very scary.” Norm Leong, the head of Regional Transit Police in Sacramento, California, plans to improve the system through use of more video and patrol coordination with local police.
All too easily, there can be a vast disconnect between security and finance. Chief financial officers are looking out for every penny, and security departments can be frequently written off as cost centers. However, there has been growing involvement and partnerships in both directions, with CSOs now successfully proving security’s value to the enterprise and CFOs championing security and cybersecurity initiatives to better mitigate enterprise risks.
This month’s column takes over where we left off in April, bringing to a close our Top 10 list of widely held cybersecurity myths. This month’s list should prove no less provocative.
Businesses have listened to staff and abandoned in-house developed tools in favor of consumer products and ubiquitous software-as-a-service (SaaS) capabilities. They want to exploit the benefits that extensive R&D and manufacturing can bring and are willing to trade off the minor compromises that come with standardized solutions. Also, security managers are starting to ask why sites can’t be secured in the time it takes to add a Dropcam to their home network…
What does leadership mean to you? We all have our own ideas about what it means to be a good leader. For example, some people think leadership means guiding others to complete a particular task, while others believe it means motivating the members of your team to be their best selves. But while the definitions may vary, the general sentiments remain the same: leaders are people who know how to achieve goals and inspire people along the way.
This audio classification software integrates microphones, select Axis IP cameras and leading video management software to analyze noises through advanced algorithms, detecting specific sounds such as verbal aggression.
Although cyber insurance has been around for a few years now, since it is still a fairly new concept and the industry is expected to grow exponentially in the near future, companies may have questions. Lynda A. Bennett, Chair of Insurance Coverage Practice at the law firm of Lowenstein Sandler, LLP, in Roseland, New Jersey, spoke with Security about the ins and outs of cyber insurance. As an attorney specializing in these types of claims, Bennett represents enterprises, not insurers.
According to an updated policy statement from the American Academy of Pediatrics, school-based “suspicionless” drug testing does little to help identify kids who use drugs and get them into treatment programs.
Organizations that have suffered a ransomware attack before are more likely to pay up again, and keep mum about it too, according to a ThreatTrack study.
The ASIS International 61st Annual Seminar and Exhibits (ASIS 2015) is westward bound this year. Set for September 28 – October 1 at the Anaheim Convention Center, this year’s event is shaping up to be one no security management practitioner will want to miss. The event is anticipated to welcome more than 19,000 global security professionals from both the operational and cybersecurity disciplines for three days of education, technology and service exhibits, and networking.